@@ -271,19 +271,6 @@ config BOOT_FIRMWARE_LOADER
271
271
272
272
endchoice
273
273
274
- # Workaround for not being able to have commas in macro arguments
275
- DT_CHOSEN_Z_SRAM := zephyr,sram
276
-
277
- if BOOT_RAM_LOAD
278
- config BOOT_IMAGE_EXECUTABLE_RAM_START
279
- hex "Boot image executable ram start"
280
- default $(dt_chosen_reg_addr_hex,$(DT_CHOSEN_Z_SRAM))
281
-
282
- config BOOT_IMAGE_EXECUTABLE_RAM_SIZE
283
- int "Boot image executable base size"
284
- default $(dt_chosen_reg_size_int,$(DT_CHOSEN_Z_SRAM),0)
285
- endif
286
-
287
274
config BOOT_DIRECT_XIP_REVERT
288
275
bool "Enable the revert mechanism in direct-xip mode"
289
276
depends on BOOT_DIRECT_XIP
@@ -320,6 +307,31 @@ config BOOT_SWAP_SAVE_ENCTLV
320
307
321
308
endif # !SINGLE_APPLICATION_SLOT
322
309
310
+ if SINGLE_APPLICATION_SLOT
311
+
312
+ config SINGLE_APPLICATION_SLOT_RAM_LOAD
313
+ bool "RAM load for single application slot"
314
+ help
315
+ If y, the image is loaded to RAM and executed from there. For this reason,
316
+ the image has to be linked to be executed from RAM. The address that the
317
+ image is copied to is specified using the load-addr argument to the
318
+ imgtool.py script which writes it to the image header.
319
+
320
+ endif # SINGLE_APPLICATION_SLOT
321
+
322
+ # Workaround for not being able to have commas in macro arguments
323
+ DT_CHOSEN_Z_SRAM := zephyr,sram
324
+
325
+ if BOOT_RAM_LOAD || SINGLE_APPLICATION_SLOT_RAM_LOAD
326
+ config BOOT_IMAGE_EXECUTABLE_RAM_START
327
+ hex "Boot image executable ram start"
328
+ default $(dt_chosen_reg_addr_hex,$(DT_CHOSEN_Z_SRAM))
329
+
330
+ config BOOT_IMAGE_EXECUTABLE_RAM_SIZE
331
+ int "Boot image executable base size"
332
+ default $(dt_chosen_reg_size_int,$(DT_CHOSEN_Z_SRAM),0)
333
+ endif
334
+
323
335
config BOOT_ENCRYPTION_SUPPORT
324
336
bool
325
337
help
0 commit comments